Talk:Hyper-encryption

Latest comment: 3 years ago by Bastiaan Zapf in topic Sketchy at best

Hey guys, edit

I know this is incomplete, but Google only gave a couple good sources. If anybody cares, use Altavista or Lycos and see what you can get.

Cheers, brainybassist

Complete rewrite edit

I have now completely rewritten this article: it now needs expert review. -- Karada 20:03, 27 April 2006 (UTC)Reply

Sounds Snake Oily To Me. edit

I am not familiar with the referenced paper, so I may be missing something, but the "plaintext" description of this "cryptosystem" sounds a lot like an OTP to me. Can anyone explain why this is NOT an OTP with another name? —Preceding unsigned comment added by 99.28.214.112 (talk) 19:29, 6 October 2010 (UTC)Reply

It definitively is not snake oil. Snake oil would mean that the authors make unfounded claims. This is not the case here. The papers use well defined assumptions and prove their results. The assumptions used in those papers are quite unconventional. E.g. the bounded-storage model assumes that there is a commonly accessible data stream that produces more bits than anyone can store. Such assumptions may make the resulting cryptosystem unpractical for most/all real-world applications, but that does not mean it snake oil. 81.62.29.213 (talk) 16:31, 7 October 2010 (UTC)Reply

Sketchy at best edit

The Article describes a (rather clever) way to have "one time pads". Now, if anybody acts upon some information gained from secret communication, they'd communicate ("make public") the information that they had this information. So the point is kind of moot. That is, up to bullshit.

--Bastiaan Zapf (talk) 17:04, 30 January 2021 (UTC)Reply